Method of transacting a purchase

Inactive Publication Date: 2005-01-13
PRIVACASH
View PDF35 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0005] In accordance with the present invention, a method is provided for transacting an anonymous purchase over the Internet. The method comprises the steps of: (a) acquiring intermediary credit account information from a purchasing intermediary; (b) providing transactional purchase information, including the intermediary credit account information, to a retailer, where the transactional purchase information is provided by the purchaser using a first computing device of a computer-implemented purchasing system; and (c) transacting a purchase between the purchaser and the retailer using the intermediary credit account information, thereby maintaining the anonymity of the purchaser.

Problems solved by technology

However, even if no “hacking” takes place, the vendor ultimately has the consumer's credit card number.
In other words, circulating information relating to the consumer's purchase could prove to be damaging to the consumer.
The current mechanism for transacting purchases over the Internet could lead to irreparable harm and embarrassment to one's credit standing as well as one's personal and professional business life.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of transacting a purchase
  • Method of transacting a purchase
  • Method of transacting a purchase

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012]FIG. 1 illustrates the basic components of a conventional computer-implemented purchasing system 10. The purchasing system 10 is comprised of a plurality of purchasing computing devices 12 interconnected via a network 14 (e.g., the Internet) to at least one retail computing device 16. As will be apparent to one skilled in the art, the computing devices are able to communicate using common communication protocols (e.g., TCP / IP) over different types of network channels. For illustration purposes, a preferred embodiment of the computing device is a personal computer (PC). Of course, it will be appreciated that the principles of the invention can be employed in a wide variety of computing devices, including but not limited to a telephone, a television or a personal digital assistant (PDA).

[0013] In accordance with the present invention, an overview of a method for transacting an anonymous purchase using the computer-implemented purchasing system 10 is shown in FIG. 2. First, a pu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method is provided for transacting an anonymous purchase over the Internet. The method comprises the steps of: (a) acquiring intermediary credit account information from a purchasing intermediary; (b) providing transactional purchase information, including the intermediary credit account information, to a retailer, where the transactional purchase information is provided by the purchaser using a first computing device of a computer-implemented purchasing system; and (c) transacting a purchase between the purchaser and the retailer using the intermediary credit account information, thereby maintaining the anonymity of the purchaser.

Description

BACKGROUND OF THE INVENTION [0001] The present invention relates generally to a method for making a purchase over the Internet, and more particularly to a method of transacting an anonymous purchase through the use of intermediary credit account information. [0002] Currently, a consumer wishing to make a purchase over the Internet must utilize their personal credit card. Secured servers utilized by online vendors accept credit cards and provide protection, via various encryption processes, for the interception of credit card information by third party “hackers”. However, even if no “hacking” takes place, the vendor ultimately has the consumer's credit card number. Having the credit card number provides a trail back to the consumer's social security number and other private and personal information which the consumer would not normally circulate. [0003] Possession of the credit card number, in effect, gives the vendor the opportunity to circulate information regarding the consumer, i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/04G06Q20/10G06Q20/12G06Q20/24G06Q20/34G06Q20/36G06Q20/38G06Q30/06G06Q40/00G07F7/08
CPCG06Q20/04G06Q40/12G06Q20/105G06Q20/12G06Q20/24G06Q20/3433G06Q20/363G06Q20/382G06Q20/383G06Q20/385G06Q30/06G06Q30/0601G06Q40/00G07F7/02G07F7/0866G06Q20/10
Inventor SUTTON, DAVID B.BLASIMAN, DOUGLAS E.
Owner PRIVACASH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products